We would like to live in a world where those infrastructures were more trustworthy because they touch a lot of data that isn’t encrypted, but our methodology is that we don’t trust them and we use encryption to allow us to use them anyway.
j previous speech k next speech